SG11201607650QA - Systems and methods for detecting copied computer code using fingerprints - Google Patents
Systems and methods for detecting copied computer code using fingerprintsInfo
- Publication number
- SG11201607650QA SG11201607650QA SG11201607650QA SG11201607650QA SG11201607650QA SG 11201607650Q A SG11201607650Q A SG 11201607650QA SG 11201607650Q A SG11201607650Q A SG 11201607650QA SG 11201607650Q A SG11201607650Q A SG 11201607650QA SG 11201607650Q A SG11201607650Q A SG 11201607650QA
- Authority
- SG
- Singapore
- Prior art keywords
- fingerprints
- systems
- methods
- computer code
- copied computer
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/75—Structural analysis for program understanding
- G06F8/751—Code clone detection
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201461973125P | 2014-03-31 | 2014-03-31 | |
US14/314,407 US8997256B1 (en) | 2014-03-31 | 2014-06-25 | Systems and methods for detecting copied computer code using fingerprints |
US14/621,554 US9218466B2 (en) | 2014-03-31 | 2015-02-13 | Systems and methods for detecting copied computer code using fingerprints |
PCT/US2015/022650 WO2015153260A1 (en) | 2014-03-31 | 2015-03-26 | Systems and methods for detecting copied computer code using fingerprints |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201607650QA true SG11201607650QA (en) | 2016-10-28 |
Family
ID=52708074
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201607650QA SG11201607650QA (en) | 2014-03-31 | 2015-03-26 | Systems and methods for detecting copied computer code using fingerprints |
Country Status (6)
Country | Link |
---|---|
US (2) | US8997256B1 (en) |
EP (1) | EP3126958B1 (en) |
AU (1) | AU2015241299B2 (en) |
CA (1) | CA2942360A1 (en) |
SG (1) | SG11201607650QA (en) |
WO (1) | WO2015153260A1 (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9459861B1 (en) | 2014-03-31 | 2016-10-04 | Terbium Labs, Inc. | Systems and methods for detecting copied computer code using fingerprints |
US20160042180A1 (en) * | 2014-08-07 | 2016-02-11 | Ut Battelle, Llc | Behavior specification, finding main, and call graph visualizations |
CA2980538A1 (en) * | 2015-03-26 | 2016-09-29 | Terbium Labs, Inc. | Systems and methods for detecting copied computer code using fingerprints |
JP2017010476A (en) * | 2015-06-26 | 2017-01-12 | 三菱電機株式会社 | Similarity determination device, similarity determination method and similarity determination program |
US10140287B2 (en) | 2015-09-09 | 2018-11-27 | International Business Machines Corporation | Scalable and accurate mining of control flow from execution logs across distributed systems |
US9547484B1 (en) | 2016-01-04 | 2017-01-17 | International Business Machines Corporation | Automated compiler operation verification |
CN109155736A (en) * | 2016-03-21 | 2019-01-04 | 利弗莱姆有限公司 | Data watermarking and fingerprinting system and method |
US10261784B1 (en) | 2018-06-20 | 2019-04-16 | Terbium Labs, Inc. | Detecting copied computer code using cryptographically hashed overlapping shingles |
BR102018077436A2 (en) * | 2018-12-28 | 2020-07-07 | Samsung Eletrônica da Amazônia Ltda. | forced execution method of flow control integrity in a monolithic binary using static analysis |
US11099842B2 (en) * | 2019-01-08 | 2021-08-24 | Saudi Arabian Oil Company | Source code similarity detection using digital fingerprints |
CN110598408B (en) * | 2019-08-23 | 2021-03-26 | 华中科技大学 | App clone detection method and system based on function layer coding |
US11972256B2 (en) | 2022-02-16 | 2024-04-30 | International Business Machines Corporation | Software code analysis using fuzzy fingerprinting |
Family Cites Families (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020009208A1 (en) | 1995-08-09 | 2002-01-24 | Adnan Alattar | Authentication of physical and electronic media objects using digital watermarks |
US5559884A (en) | 1994-06-30 | 1996-09-24 | Microsoft Corporation | Method and system for generating and auditing a signature for a computer program |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6157721A (en) | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US6000030A (en) | 1996-06-20 | 1999-12-07 | Emc Corporation | Software fingerprinting and branding |
US7590853B1 (en) | 1996-08-12 | 2009-09-15 | Intertrust Technologies Corporation | Systems and methods using cryptography to protect secure computing environments |
US6108420A (en) | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
AU7957998A (en) | 1997-06-09 | 1999-01-25 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
WO1999064973A1 (en) | 1998-06-10 | 1999-12-16 | Auckland Uniservices Limited | Software watermarking techniques |
US6966002B1 (en) | 1999-04-30 | 2005-11-15 | Trymedia Systems, Inc. | Methods and apparatus for secure distribution of software |
US7770016B2 (en) | 1999-07-29 | 2010-08-03 | Intertrust Technologies Corporation | Systems and methods for watermarking software and other media |
US7058941B1 (en) | 2000-11-14 | 2006-06-06 | Microsoft Corporation | Minimum delta generator for program binaries |
US7739737B2 (en) * | 2003-07-29 | 2010-06-15 | Wisconsin Alumni Research Foundation | Method and apparatus to detect malicious software |
US8661559B2 (en) | 2003-08-18 | 2014-02-25 | Riverside Research Institute | Software control flow watermarking |
US20090328185A1 (en) * | 2004-11-04 | 2009-12-31 | Eric Van Den Berg | Detecting exploit code in network flows |
US8056138B2 (en) | 2005-02-26 | 2011-11-08 | International Business Machines Corporation | System, method, and service for detecting improper manipulation of an application |
US8046834B2 (en) * | 2005-03-30 | 2011-10-25 | Alcatel Lucent | Method of polymorphic detection |
US20080134326A2 (en) * | 2005-09-13 | 2008-06-05 | Cloudmark, Inc. | Signature for Executable Code |
US8176568B2 (en) | 2005-12-30 | 2012-05-08 | International Business Machines Corporation | Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system |
US20070239993A1 (en) | 2006-03-17 | 2007-10-11 | The Trustees Of The University Of Pennsylvania | System and method for comparing similarity of computer programs |
KR100797024B1 (en) | 2006-05-02 | 2008-01-22 | 한국전자통신연구원 | Method and apparatus for hybrid image watermarking |
US8214497B2 (en) | 2007-01-24 | 2012-07-03 | Mcafee, Inc. | Multi-dimensional reputation scoring |
US20100011441A1 (en) * | 2007-05-01 | 2010-01-14 | Mihai Christodorescu | System for malware normalization and detection |
US7912894B2 (en) * | 2007-05-15 | 2011-03-22 | Adams Phillip M | Computerized, copy-detection and discrimination apparatus and method |
WO2009065135A1 (en) | 2007-11-17 | 2009-05-22 | Uniloc Corporation | System and method for adjustable licensing of digital products |
KR100960120B1 (en) | 2007-12-17 | 2010-05-27 | 한국전자통신연구원 | Signature String Storing Memory Structure and the Storing Method for the Same, Signature String Pattern Matching Method |
US8533848B2 (en) | 2009-02-18 | 2013-09-10 | Korea Advanced Institute Of Science And Technology | Method and system for producing multimedia fingerprint based on quantum hashing |
CN102012862A (en) | 2010-11-09 | 2011-04-13 | 北京神舟航天软件技术有限公司 | Verification method of compiler based on contrast of logical structures of control flow graphs |
US8666999B2 (en) * | 2011-08-02 | 2014-03-04 | Rockwell Automation Technologies, Inc. | Search utility program for software developers |
US20140006375A1 (en) * | 2012-07-02 | 2014-01-02 | Andrea G. FORTE | Method and apparatus for robust mobile application fingerprinting |
US9003529B2 (en) * | 2012-08-29 | 2015-04-07 | The Johns Hopkins University | Apparatus and method for identifying related code variants in binaries |
WO2015060832A1 (en) * | 2013-10-22 | 2015-04-30 | Mcafee, Inc. | Control flow graph representation and classification |
US10747880B2 (en) * | 2013-12-30 | 2020-08-18 | University Of Louisiana At Lafayette | System and method for identifying and comparing code by semantic abstractions |
-
2014
- 2014-06-25 US US14/314,407 patent/US8997256B1/en active Active
-
2015
- 2015-02-13 US US14/621,554 patent/US9218466B2/en active Active
- 2015-03-26 CA CA2942360A patent/CA2942360A1/en not_active Abandoned
- 2015-03-26 SG SG11201607650QA patent/SG11201607650QA/en unknown
- 2015-03-26 AU AU2015241299A patent/AU2015241299B2/en not_active Ceased
- 2015-03-26 WO PCT/US2015/022650 patent/WO2015153260A1/en active Application Filing
- 2015-03-26 EP EP15772391.7A patent/EP3126958B1/en not_active Not-in-force
Also Published As
Publication number | Publication date |
---|---|
WO2015153260A1 (en) | 2015-10-08 |
EP3126958A4 (en) | 2017-11-08 |
AU2015241299A1 (en) | 2016-11-17 |
US20150278490A1 (en) | 2015-10-01 |
US9218466B2 (en) | 2015-12-22 |
US8997256B1 (en) | 2015-03-31 |
CA2942360A1 (en) | 2015-10-08 |
EP3126958A1 (en) | 2017-02-08 |
EP3126958B1 (en) | 2019-01-23 |
AU2015241299B2 (en) | 2019-11-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1244125B (en) | Systems and methods for malicious code detection accuracy assurance | |
HK1252103A1 (en) | Methods and systems for copy number variant detection | |
SG11201701855RA (en) | Systems and methods for liveness analysis | |
SG11201607650QA (en) | Systems and methods for detecting copied computer code using fingerprints | |
IL249962A0 (en) | Malicious code protection for computer systems based on process modification | |
HK1222744A1 (en) | Methods and systems for data analysis and compression | |
EP3195196A4 (en) | Method and fingerprint sensing system for authenticating a candidate fingerprint | |
ZA201606932B (en) | System and method for position detection | |
GB2559275B (en) | Methods and systems for performing actions based on biometric data | |
ZA201607536B (en) | Arrangement and method for identifying fingerprints | |
EP3121727A4 (en) | Information processing device and error detection method | |
HK1232324A1 (en) | Systems, devices, and methods for sample integrity verification | |
EP2988230A4 (en) | Data processing method and computer system | |
GB201502033D0 (en) | Methods and systems for analyzing healthcare data | |
HK1211122A1 (en) | Method and system for processing periodic order information | |
GB2525248B (en) | A computer security system and method | |
HK1218478A1 (en) | Method, device and system for processing interaction information | |
SG11201609822VA (en) | Kick detection systems and methods | |
HK1211152A1 (en) | Method and device for processing biometric information | |
GB201502289D0 (en) | Methods and systems for analyzing financial dataset | |
SG10201510491QA (en) | Methods and systems for flash detection | |
HK1207451A1 (en) | Method for processing data based on query log and system thereof | |
SG10201403334XA (en) | Detection system and method | |
GB201403896D0 (en) | Data processing systems and methods | |
SG11201707779XA (en) | Systems and methods for detecting copied computer code using fingerprints |